SAP SECURITY Training in Hyderbad,contact 7893255000.
R3 SEC,BW/BI Sec,HR SEC,SRM SEC,EP SEC,VIRSA and GRC Tools.
Answer Posted / sravan
Guys Never entertain this Kind of marketing through this site. Yes ofcourse providing training is good, but if you are that interested try to participate discussions and get impressed.
Don't do this again sandya
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
what is use of copy data in derived role and when we use this one ???
What does the account assessment category specify in a purchasing order in SAP Materials Management?
what is the main difference between the derived role and a single role?
Differentiate between saml token profile and a sap logon ticket
Which t-code can be used to delete old security audit logs?
How to insert missing authorization?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
What is the use of su56?
Pfcg proposed activities but you need only two. What would you do?
What profile versions?
What is the maximum number of profiles in a role and maximum number of object in a role?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?